Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2018
Security is a prime concern in the resource constrained wireless sensor networks. Traditional cryptographic mechanisms cannot be used with these networks due to their limited battery. Clustering is one of the popular methods to improve the energy efficiency of WSN. In this chapter, the authors propose a secure routing protocol for cluster-based wireless sensor networks. A hierarchical topology is formed by the base station, which is also responsible for distributing the cryptographic keys among the nodes. Security analysis of the proposed protocol is done against various security attacks. The efficiency of the proposed protocol is explained through mathematical calculations and simulations. The proposed protocol also performs better than other existing secure protocols for cluster-based WSN regarding battery life and security overhead.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
A Survey on Hierarchical Cluster Based Secure Routing Protocols and Key Management Schemes in Wireless Sensor Networks2018 •
Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among othe...
International Journal of Engineering Research and Technology (IJERT)
IJERT-A Secured Routing Technique for Wireless Sensor Networks2014 •
https://www.ijert.org/a-secured-routing-technique-for-wireless-sensor-networks https://www.ijert.org/research/a-secured-routing-technique-for-wireless-sensor-networks-IJERTV3IS030384.pdf Wireless Sensor Networks (WSNs) are networks which sense the data from a remote region and collect it before transmission. The collected information is transmitted to the sink node. Hence the information needs to be passed in an energy efficient and secured manner. Many of the existing routing protocols do not guarantee the optimal selection of cluster heads. The cluster head selection does not necessarily take into account the remaining energy of the nodes. Hence the protocol which takes into account the remaining energy of the nodes for cluster head election is analyzed. The Adaptive Energy-efficient Routing Protocol (AECRP) considers the remaining energy of the nodes and provides an energy-efficient network. Further the data is encrypted using the RSA algorithm to provide a secure and reliable data delivery. This paper involves the analysis of the energy consumption of Low Energy Adaptive Clustering Hierarchy (LEACH) and AECRP. The comparison of LEACH and AECRP in terms of end-to-end delay , throughput, energy consumed, and packet delivery ratio with and without encryption are analyzed.
2013 •
Wireless Sensor Networks (WSNs) are often deployed in hostile environments, which make such networks highly vulnerable and increase the risk of attacks against this type of network. WSN comprise of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in sensor networks. Therefore, it is necessary to balance between the security level and the associated energy consumption overhead to mitigate the security risks. Hierarchical routing protocol is more energy-efficient than other routing protocols in WSNs. Many secure cluster-based routing protocols have been proposed in the literature to overcome these constraints. In this paper, we discuss Secure Energy-Efficient Hierarchical Routing Protocols in WSNs and compare them in terms of security, performance and efficiency. Security issues for WSNs and their solutions are also discussed.
— Wireless Sensor Networks (WSN) plays vital role in research field. Due to its rapidly increasing application in monitoring various kinds of environment by sensing physical phenomenon. Clustering is an efficient and effective method to enhance performance of the WSNs system. In this project work, we study a secure transmission of data for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and randomly. We propose two Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, respectively. The cluster routing protocol LEACH (Low-Energy Adaptive Clustering Hierarchy) is considered and improved. In SET-IBS, security relies on the hardness of the Diffie-Hellman problem in the pairing area. SET-IBOOS additionally decreases the computational operating cost for protocol security, which is critical for WSNs, while its defense depends on the stability of the problem of discrete logarithm. We propose a clustering routing protocol named Enhanced LEACH, which extends LEACH protocol by balancing the energy consumption in the network. The simulation results show that Enhanced LEACH outperforms LEACH in terms of network system lifetime and reduce the energy consumption.
Wireless Sensor Networks
Energy Efficient and Secured Cluster Based Routing Protocol for Wireless Sensor Networks2011 •
Nodes in many wireless sensor networks (WSNs) are powered by batteries with limited energy. Enhancing network lifetime and saving energy are two basic issues for WSNs. Some energy-saving routing algorithms can reduce total energy consumption of a WSN, however, they place too heavy burden of forwarding data packets on several key nodes so that these nodes quickly drain out available battery energy, making network lifetime shortened. These papers propose technique known as Secure Energy Efficient Routing Protocol for WSNs. Here in proposed system user first generate the network and form the clusters. After that cluster head and DCH is selected in each cluster. The work of DCH is the send location to the base station. The cluster members encrypt the data using encryption algorithm and send to the CH with hash of encrypt data. CH verifies data of each member. If any CH is faulty or not able to forward all members data then BS allocate the DCH as a CH and then CM send data to that CH and this CH forward the data to BS. The proposed protocol route the data securely by consuming less energy and enhance the network lifetime.
Wireless Sensor Networks (WSN) plays vital role in research field. Due to its rapidly increasing application in monitoring various kinds of environment by sensing physical phenomenon. Clustering is an efficient and effective method to enhance performance of the WSNs system. In this project work, we study a secure transmission of data for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and randomly. We propose two Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-Based Online/Offline digital Signature (IBOOS) scheme, respectively. The cluster routing protocol LEACH (Low-Energy Adaptive Clustering Hierarchy) is considered and improved. In SET-IBS, security relies on the hardness of the Diffie-Hellman problem in the pairing area. SET-IBOOS additionally decreases the computational operating cost for protocol security, which is critical for WSNs, while its defense depends on the stability of the problem of discrete logarithm. We propose a clustering routing protocol named Enhanced LEACH, which extends LEACH protocol by balancing the energy consumption in the network. The simulation results show that Enhanced LEACH outperforms LEACH in terms of network system lifetime and reduce the energy consumption.
International Journal of Engineering Research and Technology (IJERT)
IJERT-A Review on Secured and Energy-Efficient Routing Protocols in Wireless Sensor Networks (WSNs2021 •
https://www.ijert.org/a-review-on-secured-and-energy-efficient-routing-protocols-in-wireless-sensor-networks-wsns https://www.ijert.org/research/a-review-on-secured-and-energy-efficient-routing-protocols-in-wireless-sensor-networks-wsns-IJERTV10IS030070.pdf In wireless sensor networks (WSNs), the energy supply of sensor devices is limited. One of the basic architecture problems in WSNs is sensor dies due to dissipating battery capacity. As a result, it is argued that energy conservation is the most significant criterion for any protocol built for WSNs. Thousands of lightweight, inexpensive sensors can be randomly distributed in open and harsh environments to gather data in Wireless Sensor Networks (WSNs). The low battery life of battery-operated sensors, as well as hostile conditions, require the development of energy-efficient, secure and reliable sensor network protocols. Routing, out of the broad range of network protocols, is the most critical in terms of energy consumption, as data transmission absorbs 70% of total energy in WSNs. As a result, energy-efficient routing systems must be built in order to save energy and increase the network's lifespan. However, resource-limited sensors, the lack of a global solution scheme and the application-specific nature of WSNs pose a challenge to routing. Furthermore, security is yet another critical problem in WSNs, as sensors are typically installed in insecure areas and susceptible to security attacks. Many of the current routing protocols have various security measures in place to meet security objectives. We present a brief review on various secure and energy-efficient routing protocols in wireless sensor networks, outlining their underlying principle and operations.
Tikrit Journal For Political Science
مراحل تطور الاستراتيجية الروسية من الانهيار الى استعادة الدور والمكانة2022 •
Temaşa: Erciyes Üniversitesi Felsefe Dergisi
Nietzsche's Early Views on the Relation between Language and Philosophy2024 •
Revista de la Asociación Española de Neuropsiquiatría
Trastornos de personalidad en el DSM-5: una aproximación crítica2013 •
FENERBAHÇE ÜNİVERSİTESİ İLETİŞİM FAKÜLTESİ I. Ulusal Marka Yönetimi Kongresi Bildiri Kitabı
Sözde ve Genel Demarketing Stratejileri Uygulayan Reklamların KarşılaştırılmasıCheiron
Il valore fiduciario del denaro e la razionalizzazione della violenza europea (secoli XV-XVIII)2019 •
IEEE Transactions on Robotics and Automation
Event-based feedback control for deadlock avoidance in flexible production systems1997 •
American Journal of Medical Genetics
A revised and extended classification of the distal arthrogryposes1996 •
Research Journal of Medical Sciences
Requirement of Organic Factors for the Growth of Datura stramonium in vitro Tissues Cultured2010 •
2018 •
Journal of Environmental Analysis and Progress
Bee richness and abundance in small fruit farms from semiarid landscape, NE, BrazilApplied Microbiology and Biotechnology
Elicitors’ influenced differential ginsenoside production and exudation into medium with concurrent Rg3/Rh2 panaxadiol induction in Panax quinquefolius cell suspensions2016 •
Annals of Pharmacotherapy
Effect of Scheduling Tramadol as a Controlled Substance on Poison Center Exposures to Tramadol2010 •
HAL (Le Centre pour la Communication Scientifique Directe)
Stochastic Analysis of Mesoscopic Elasticity Random Rields obtained by Filtering Framework2015 •
York st John University
Thesis An analaysis of the impact of Covid 19 on bank loans and real estate financing in UAE2021 •
ARBITRER: Jurnal Pendidikan Bahasa dan Sastra Indonesia
Reduplikasi Morfologis Dalam Novel Bintang Karya Tere Liye